CVE-2004-0184
tcpdump - ISAKMP Identification Payload Integer Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Integer underflow in the isakmp_id_print for TCPDUMP 3.8.1 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with an Identification payload with a length that becomes less than 8 during byte order conversion, which causes an out-of-bounds read, as demonstrated by the Striker ISAKMP Protocol Test Suite.
Desbordamieto de enteros en la función isakmp_id_print de TCPDUMP 3.8.1 y anteriores permite a atacantes remotos causar una denegación de servicio mediante un paquete ISAKMP con una carga útil de identificación con una longitud que se hace menor de 8 durante una conversión de orden de bytes, lo que causa una lectura fuera de límites, como se ha demostrado por el paquete de pruebas de protocolo ISAKMP Striker.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2004-03-02 CVE Reserved
- 2004-03-30 CVE Published
- 2004-04-05 First Exploit
- 2024-08-08 CVE Updated
- 2024-09-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-125: Out-of-bounds Read
- CWE-191: Integer Underflow (Wrap or Wraparound)
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=bugtraq&m=108067265931525&w=2 | Mailing List | |
http://secunia.com/advisories/11258 | Broken Link | |
http://securitytracker.com/id?1009593 | Broken Link | |
http://www.kb.cert.org/vuls/id/492558 | Third Party Advisory | |
http://www.securityfocus.com/bid/10004 | Broken Link | |
http://www.tcpdump.org/tcpdump-changes.txt | Release Notes | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15679 | Broken Link | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9581 | Broken Link | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A976 | Broken Link |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/171 | 2004-04-05 | |
http://www.rapid7.com/advisories/R7-0017.html | 2024-08-08 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2004/dsa-478 | 2024-02-15 |
URL | Date | SRC |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2004-219.html | 2024-02-15 | |
http://www.trustix.org/errata/2004/0015 | 2024-02-15 | |
https://bugzilla.fedora.us/show_bug.cgi?id=1468 | 2024-02-15 | |
https://access.redhat.com/security/cve/CVE-2004-0184 | 2004-05-26 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1617175 | 2004-05-26 |